K. R. Venugopal

Orcid: 0009-0005-6091-8483

Affiliations:
  • Bangalore University, Bengaluru, India


According to our database1, K. R. Venugopal authored at least 172 papers between 1998 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A novel SLCA-UNet architecture for automatic MRI brain tumor segmentation.
Biomed. Signal Process. Control., 2025

2024
V-LTCS: Backbone exploration for Multimodal Misogynous Meme detection.
Nat. Lang. Process. J., 2024

MUNPE:Multi-view uncorrelated neighborhood preserving embedding for unsupervised feature extraction.
Knowl. Based Syst., 2024

Unsupervised feature extraction based on uncorrelated approach.
Inf. Sci., 2024

Secure pharmaceutical supply chain using blockchain in IoT cloud systems.
Internet Things, 2024

Object detection and crowd analysis using deep learning techniques: Comprehensive review and future directions.
Neurocomputing, 2024

GSKTM: efficient of query search for spatial keyword in text mining.
Int. J. Inf. Commun. Technol., 2024

SEGC-PP: structure entropy-based graph clustering algorithm for privacy preservation in social internet of things.
Int. J. Inf. Comput. Secur., 2024

EBT Deep Net: Ensemble brain tumor Deep Net for multi-classification of brain tumor in MR images.
Biomed. Signal Process. Control., 2024

Graph Laplacian Eigenvalues Empowered VAEs: A Novel Approach to Adaptive Latent Dimension Choice.
IEEE Access, 2024

2023
Node clustering and data aggregation in wireless sensor network using sailfish optimization.
Multim. Tools Appl., November, 2023

Fault tolerance aware workload resource management technique for real-time workload in heterogeneous computing environment.
Trans. Emerg. Telecommun. Technol., March, 2023

Online offensive behaviour in socialmedia: Detection approaches, comprehensive review and future directions.
Entertain. Comput., March, 2023

An optimised local feature compression using statistical and structural approach for face recognition.
Int. J. Comput. Vis. Robotics, 2023

Monitoring of environmental parameters using internet of things and analysis of correlation between the parameters in a DWC hydroponic technique.
Int. J. Adv. Intell. Paradigms, 2023

Reduction of jitter in 3D video by transmitting over multiple network paths.
Int. J. Adv. Intell. Paradigms, 2023

Early Prediction of Sepsis using ML Algorithms on Clinical Data.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

Online Aggression Identification Using Ensembled Transformer-based Language Models.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

2021
Minimal Block Knight's Tour and Edge with LSB Pixel Replacement Based Encrypted Image Steganography.
SN Comput. Sci., May, 2021

VEDSDA: Voronoi Encryption and Decryption for Secure Data Aggregation in WSNs.
Wirel. Pers. Commun., 2021

Cross Layer Design for Wi-Fi Sensor Network Handling Static and Dynamic Environment Using Local Automate Based Autonomic Network Architecture.
SN Comput. Sci., 2021

SDAFPS: Secure Data Aggregation using Fuzzy Judgement, Pattern Category and SHAP Contribution.
SN Comput. Sci., 2021

Energy Concerned Clustering Mechanism to Ensure Reliable Data Transmission in Wireless Sensor Network.
SN Comput. Sci., 2021

DTCMS: Dynamic traffic congestion management in Social Internet of Vehicles (SIoV).
Internet Things, 2021

Hardware performance analysis of RSA cryptosystems on FPGA for wireless sensor nodes.
Int. J. Intell. Networks, 2021

<i>R</i><sup>2</sup><i>DCLT</i>: retrieving relevant documents using cosine similarity and LDA in text mining.
Int. J. Inf. Commun. Technol., 2021

REERS: Reliable and energy-efficient route selection algorithm for heterogeneous Internet of things applications.
Int. J. Commun. Syst., 2021

Designing WiMAX Static Environment using Local Automata based Autonomic Network Architecture for Wireless Sensor Networks.
Proceedings of the 12th International Conference on Ambient Systems, 2021

2020
Energy aware resource allocation and complexity reduction approach for cognitive radio networks using game theory.
Phys. Commun., 2020

CRUPA: collusion resistant user revocable public auditing of shared data in cloud.
J. Cloud Comput., 2020

Application of computational intelligence techniques for internet of things: an extensive survey.
Int. J. Comput. Intell. Stud., 2020

Windowing approach for face recognition using the spatial-temporal method and artificial neural network.
Int. J. Appl. Pattern Recognit., 2020

Carry Forward and Access Control for Unused Resources in Multi Sharing System of Hybrid Cloud.
Future Gener. Comput. Syst., 2020

Framework for Cross Layer Energy Optimization in Wireless Sensor Networks.
EAI Endorsed Trans. Energy Web, 2020

Trust Management for Service-Oriented SIoT Systems.
Proceedings of the ICIT 2020, 2020

EFUMS: Efficient File Upload and Mutli-Keyword Search over Encrypted Cloud Data.
Proceedings of the 11th International Conference on Computing, 2020

IR-FF-GSO: Image Retrieval using Feature Fusion and Glowworm Swarm Optimization.
Proceedings of the 11th International Conference on Computing, 2020

Hybrid Domain Steganography for Embedding DES Encrypted QR Code Using Random Bit Binary Search.
Proceedings of the Context-Aware Systems and Applications, and Nature of Computation and Communication, 2020

Improved Packet Delivery for Wireless Sensor Networks Using Local Automate Based Autonomic Network Architecture in a ZigBee Environment.
Proceedings of the Context-Aware Systems and Applications, and Nature of Computation and Communication, 2020

QoS Routing Algorithms for Wireless Sensor Networks
Springer, ISBN: 978-981-15-2719-7, 2020

Web Recommendations Systems.
Springer, ISBN: 978-981-15-2513-1, 2020

2019
Geographic opportunistic routing protocol based on two-hop information for wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2019

Social Internet of Things (SIoT): Foundations, thrust areas, systematic review and future directions.
Comput. Commun., 2019

Resource allocation in the cloud for video-on-demand applications using multiple cloud service providers.
Clust. Comput., 2019

SIRLC: Secure Information Retrieval using Lightweight Cryptography in HIoT.
Proceedings of the TENCON 2019, 2019

Progressive Search Algorithm for Service Discovery in an IoT Ecosystem.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

SoCo-ITS: Service Oriented Context Ontology for Intelligent Transport System.
Proceedings of the ICIT 2019, 2019

HPAKE: Hybrid Precocious Authentication and Key Establishment in IoT.
Proceedings of the 2019 International Carnahan Conference on Security Technology, 2019

Anonymity and Performance Analysis of Stream Isolation in Tor Network.
Proceedings of the 10th International Conference on Computing, 2019

2018
Split keyword fuzzy and synonym search over encrypted cloud data.
Multim. Tools Appl., 2018

Cost and fault-tolerant aware resource management for scientific workflows using hybrid instances on clouds.
Multim. Tools Appl., 2018

RRDVCR: Real-Time Reliable Data Delivery Based on Virtual Coordinating Routing for Wireless Sensor Networks.
J. Comput. Sci., 2018

Hard exudate based severity assessment of diabetic macular edema from retinal fundus images.
Int. J. Medical Eng. Informatics, 2018

Implementation of Fingerprint Based Biometric System Using Optimized 5/3 DWT Architecture and Modified CORDIC Based FFT.
Circuits Syst. Signal Process., 2018

Searching for the IoT Resources: Fundamentals, Requirements, Comprehensive Review, and Future Directions.
IEEE Commun. Surv. Tutorials, 2018

A novel sentiment aware dictionary for multi-domain sentiment classification.
Comput. Electr. Eng., 2018

Consumer insight mining: Aspect based Twitter opinion mining of mobile phone reviews.
Appl. Soft Comput., 2018

Forward Secrecy in Authentic and Anonymous Cloud with Time Optimization.
Proceedings of the Fifteenth International Conference on Wireless and Optical Communications Networks, 2018

Co-extraction of Opinion Targets and Opinion Words from Online Reviews Based on Opinion and Semantic Relations.
Proceedings of the Fifteenth International Conference on Wireless and Optical Communications Networks, 2018

Experimental Evaluation of BATMAN and BATMAN-Adv Routing Protocols in a Mobile Testbed.
Proceedings of the TENCON 2018, 2018

DRDLC: Discovering Relevant Documents Using Latent Dirichlet Allocation and Cosine Similarity.
Proceedings of the VII International Conference on Network, Communication and Computing, 2018

Elliptic Curve Crypto Processor on FPGA using Montgomery Multiplication with Vedic and Encoded Multiplier over GF (2<sup>m</sup>) for Nodes in Wireless Sensor Networks.
Proceedings of the 13th IEEE International Conference on Industrial and Information Systems, 2018

Implementation of Public Key Crypto Processor with Probabilistic Encryption on FPGA for Nodes in Wireless Sensor Networks.
Proceedings of the 9th International Conference on Computing, 2018

2017
Aspect term extraction for sentiment analysis in large movie reviews using Gini Index feature selection method and SVM classifier.
World Wide Web, 2017

ACSIR: ANOVA Cosine Similarity Image Recommendation in vertical search.
Int. J. Multim. Inf. Retr., 2017

LR<sup>3</sup>: link reliable reactive routing protocol for wireless sensor networks.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

DAMS: Data Aggregation using Mobile Sink in Wireless Sensor Networks.
Proceedings of the 5th International Conference on Communications and Broadband Networking, Bali, Indonesia, February 20, 2017

RMSC: Robust modeling of subspace clustering for high dimensional data.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2016
An Efficient Reconfigurable Architecture for Fingerprint Recognition.
VLSI Design, 2016

Query Recommendation based on Query Relevance Graph.
Trans. Mach. Learn. Data Min., 2016

RSSMSO Rapid Similarity Search on Metric Space Object Stored in Cloud Environment.
Int. J. Organ. Collect. Intell., 2016

Image recommendation based on keyword relevance using absorbing Markov chain and image features.
Int. J. Multim. Inf. Retr., 2016

IR_URFS_VF: image recommendation with user relevance feedback session and visual features in vertical image search.
Int. J. Multim. Inf. Retr., 2016

Webpage recommendation with web navigation prediction framework.
Int. J. Knowl. Web Intell., 2016

Detection of fraudulent and malicious websites by analysing user reviews for online shopping websites.
Int. J. Knowl. Web Intell., 2016

Reputation System: Evaluating Reputation among All Good Sellers.
Proceedings of the 7th Workshop on Computational Approaches to Subjectivity, 2016

PCAD: Power control attack detection in wireless sensor networks.
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016

2015
WNPWR: Web navigation prediction framework for webpage recommendation.
Proceedings of the 2nd IEEE International Conference on Recent Trends in Information Systems, 2015

HOMS: Hindi opinion mining system.
Proceedings of the 2nd IEEE International Conference on Recent Trends in Information Systems, 2015

PCVOS: Principal component variances based off-line signature verification.
Proceedings of the 2nd IEEE International Conference on Recent Trends in Information Systems, 2015

Query Click and Text Similarity Graph for Query Suggestions.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2015

Bimodal Biometric Verification Mechanism using fingerprint and face images(BBVMFF).
Proceedings of the 10th IEEE International Conference on Industrial and Information Systems, 2015

2014
Automatic discovery and ranking of synonyms for search keywords in the web.
Int. J. Web Sci., 2014

Web caching and prefetching with cyclic model analysis of web object sequences.
Int. J. Knowl. Web Intell., 2014

EDOCR: Energy Density On-demand Cluster Routing in Wireless Sensor Networks.
CoRR, 2014

Improved Bully Election Algorithm for Distributed Systems.
CoRR, 2014

Two-Hop Routing with Traffic-Differentiation for QoS Guarantee in Wireless Sensor Networks.
CoRR, 2014

Link-Reliability Based Two-Hop Routing for Wireless Sensor Networks.
CoRR, 2014

Cancer Prognosis Prediction Using Balanced Stratified Sampling.
CoRR, 2014

QoS group based optimal retransmission medium access protocol for wireless sensor networks.
CoRR, 2014

Two Stage Prediction Process with Gradient Descent Methods Aligning with the Data Privacy Preservation.
CoRR, 2014

Mathematical Model of Semantic Look - An Efficient Context Driven Search Engine.
CoRR, 2014

FPGA Based Efficient Multiplier for Image Processing Applications Using Recursive Error Free Mitchell Log Multiplier and KOM Architecture.
CoRR, 2014

Chain Routing for Convergecast Small Scale Wireless Sensor Networks.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

EESOR: Energy Efficient Selective Opportunistic Routing in Wireless Sensor Networks.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

DeMalFier: Detection of Malicious web pages using an effective classifier.
Proceedings of the International Conference on Data Science & Engineering, 2014

2013
Authentication using Finger Knuckle Prints.
Signal Image Video Process., 2013

Mobile node authentication using key distribution scheme in wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2013

Bidirectional Growth based Mining and Cyclic Behaviour Analysis of Web Sequential Patterns
CoRR, 2013

Similarity based Dynamic Web Data Extraction and Integration System from Search Engine Result Pages for Web Content Mining
CoRR, 2013

DRSP : Dimension Reduction For Similarity Matching And Pruning Of Time Series Data Streams.
CoRR, 2013

Forecasting Stock Time-Series using Data Approximation and Pattern Sequence Similarity.
CoRR, 2013

Multiple Domain Secure Routing for Wireless Sensor Networks.
CoRR, 2013

Link-reliability based two-hop routing for QoS guarantee in Wireless Sensor Networks.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Face recognition using transform domain texture features.
Proceedings of the Sixth International Conference on Machine Vision, 2013

DTCWT based high capacity steganography using coefficient replacement and adaptive scaling.
Proceedings of the Sixth International Conference on Machine Vision, 2013

Traffic-Differentiated Two-Hop Routing for QoS in Wireless Sensor Networks.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2012
Effects of Information Filters: A Phenomenon on the Web.
Int. J. Inf. Retr. Res., 2012

Ranking Search Engine Result Pages based on Trustworthiness of Websites
CoRR, 2012

2011
Heartbeat biometrics for human authentication.
Signal Image Video Process., 2011

GRM: a reliable and fault tolerant data replication middleware for grid environment.
Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011

Statistical Analysis for Human Authentication Using ECG Waves.
Proceedings of the Information Intelligence, Systems, Technology and Management, 2011

Steganalysis of Perturbed Quantization Using HBCL Statistics and FR Index.
Proceedings of the Information Intelligence, Systems, Technology and Management, 2011

Multiple Mobile Synchronised Sinks (MMSS) for Energy Efficiency and Lifetime Maximization in Wireless Sensor Networks.
Proceedings of the ICEIS 2011, 2011

KCSR: Keymatches Constrained Secure Routing in Heterogeneous Wireless Sensor Networks.
Proceedings of the ICEIS 2011, 2011

Restricting the admission of selfish or malicious nodes into the network by using efficient security services in middleware for MANETs.
Proceedings of the 2011 International Conference on Communication, 2011

Human authentication using finger knuckle print.
Proceedings of the 4th Bangalore Annual Compute Conference, Compute 2011, 2011

Middleware Service Oriented Rescue and Crime Information System (RCIS) Using Heterogeneous Fixed Nodes in WSNs.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

Covariance Based Steganography Using DCT.
Proceedings of the Advances in Computing and Communications, 2011

An Efficient Protocol to Study the Effect of Flooding on Energy Consumption in MANETS.
Proceedings of the Advances in Computing and Communications, 2011

An Efficient Framework for Prediction in Healthcare Data Using Soft Computing Techniques.
Proceedings of the Advances in Computing and Communications, 2011

2010
Fingerprint Recognition Using Minutia Score Matching
CoRR, 2010

HUBFIRE - A Multi-class SVM based JPEG Steganalysis using HBCL Statistics and FR Index.
Proceedings of the SECRYPT 2010, 2010

JPEG Steganalysis Using HBCL Statistics and FR Index.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

Fingerprint Recognition Using Inter Ridge Variation.
Proceedings of the 3rd International Conference on Emerging Trends in Engineering and Technology, 2010

Preserving Energy Using Link Protocol in Wireless Networks.
Proceedings of the Communication and Networking, 2010

Human Authentication Based on ECG Waves Using Radon Transform.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens.
Proceedings of the Communication and Networking, 2010

JHUF-5 Steganalyzer: Huffman Based Steganalytic Features for Reliable Detection of YASS in JPEG Images.
Proceedings of the Signal Processing and Multimedia, 2010

2009
Soft Computing for Data Mining Applications
Studies in Computational Intelligence 190, Springer, ISBN: 978-3-642-00192-5, 2009

Soft Computing for XML Data Mining.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Dynamic Hierarchical Communication Paradigm for Wireless Sensor Networks: A Centralized, Energy Efficient Approach.
Wirel. Sens. Netw., 2009

Fingerprint Verification based on Gabor Filter Enhancement
CoRR, 2009

An Efficient Prediction Model for Diabetic Database Using Soft Computing Techniques.
Proceedings of the Rough Sets, 2009

Offline signature authentication using cross-validated graph matching.
Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, 2009

Iris feature extraction using directional filter bank for personal identification.
Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, 2009

Extracting hidden image using histogram, DFT and SVM.
Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, 2009

Advanced Biometric Identification on Face, Gender and Age Recognition.
Proceedings of the ARTCom 2009, 2009

2008
A soft computing approach for data mining based query processing using rough sets and genetic algorithms.
Int. J. Hybrid Intell. Syst., 2008

Broadcast with negative acknowledgements for enhanced delivery ratio in MANET with dual coverage.
Proceedings of the 1st IFIP Wireless Days, 2008

Base-station controlled clustering scheme in wireless sensor networks.
Proceedings of the 1st IFIP Wireless Days, 2008

Proactive sliding -window strategy for merging sensor-enabled cars.
Proceedings of the 16th International Conference on Networks, 2008

An Efficient Storage Mechanism to Distribute Disk Load in a VoD Server.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

Robust image adaptive steganography using integer wavelets.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

2007
A self-adaptive migration model genetic algorithm for data mining applications.
Inf. Sci., 2007

Selective dissemination of XML documents based on genetically learned user model and Support Vector Machines.
Intell. Data Anal., 2007

Statistical Analysis and Compression of DNA using Weighted Probability Approach and Modified Run-Length Encoding.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007

Load Balancing in Fault Tolerant Video Server.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2007

Genetic Algorithm Based Steganography Using Wavelets.
Proceedings of the Information Systems Security, Third International Conference, 2007

Selective Querying and Other Proposals for a Less Congested Gnutella Network.
Proceedings of the Distributed Computing and Internet Technology, 2007

Data Mining based Query Processing using Rough Sets and Genetic Algorithms.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

Lesion detection using segmentation and classification of mammograms.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2007

2006
An efficient fuzzy based neuro - genetic algorithm for stock market prediction.
Int. J. Hybrid Intell. Syst., 2006

A neural network based CBIR system using STI features and relevance feedback.
Intell. Data Anal., 2006

Non-repetitive DNA Sequence Compression Using Memoization.
Proceedings of the Biological and Medical Data Analysis, 7th International Symposium, 2006

Classification of Mammograms Using Decision Trees.
Proceedings of the Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 2006

Energy Aware Topology Management in Ad Hoc Wireless Networks.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

Indexing XML Documents Using Self Adaptive Genetic Algorithms for Better Retreival.
Proceedings of the Frontiers of WWW Research and Development, 2006

2005
Sagaxsearch: an Xml Information Retrieval Mechanism Using Self Adaptive Genetic Algorithms.
Int. J. Comput. Intell. Appl., 2005

Dynamic Association Rule Mining using Genetic Algorithms.
Intell. Data Anal., 2005

Efficient Passive Clustering and Gateway Selection in MANETs.
Proceedings of the Distributed Computing, 2005

A Self-Adaptive Migration Model Genetic Algorithms for Data Mining Applications.
Proceedings of the 2nd Indian International Conference on Artificial Intelligence, 2005

A Dynamic Migration Model for Self-adaptive Genetic Algorithms.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2005

Selective Dissemination of XML Documents Using GAs and SVM.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

GaXsearch: An XML Information Retrieval Mechanism Using Genetic Algorithms.
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005

2004
Mining Top - <i>k</i> Ranked Webpages Using Simulated Annealing and Genetic Algorithms.
Proceedings of the Applied Computing, Second Asian Applied Computing Conference, 2004

2003
Evolutionary Approach for Mining Association Rules on Dynamic Databases.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2003

Dynamic Subspace Clustering for Very Large High-Dimensional Databases.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2003

2001
A heuristic for placement of limited range wavelength converters in all-optical networks.
Comput. Networks, 2001

2000
Converter placement in all-optical networks using genetic algorithms.
Comput. Commun., 2000

1999
Impact of wavelength converters in wavelength routed all-optical networks.
Comput. Commun., 1999

1998
Performance analysis of wavelength converters in WDM wavelength routed optical networks.
Proceedings of the 5th International Conference On High Performance Computing, 1998


  Loading...